LightNovesOnl.com

The Hacker Crackdown Part 6

The Hacker Crackdown - LightNovelsOnl.com

You're reading novel online at LightNovelsOnl.com. Please use the follow button to get notifications about your favorite novels and its latest chapters so you can come back anytime and won't miss anything.

From the outside, to the average citizen, the telcos still seem gigantic and impersonal. The American public seems to regard them as something akin to Soviet apparats.

Even when the telcos do their best corporate-citizen routine, subsidizing magnet high-schools and sponsoring news-shows on public television, they seem to win little except public suspicion.

But from the inside, all this looks very different.

There's harsh compet.i.tion. A legal and political system that seems baffled and bored, when not actively hostile to telco interests. There's a loss of morale, a deep sensation of having somehow lost the upper hand. Technological change has caused a loss of data and revenue to other, newer forms of transmission. There's theft, and new forms of theft, of growing scale and boldness and sophistication.

With all these factors, it was no surprise to see the telcos, large and small, break out in a litany of bitter complaint.

In late '88 and throughout 1989, telco representatives grew shrill in their complaints to those few American law enforcement officials who make it their business to try to understand what telephone people are talking about.

Telco security officials had discovered the computer- hacker underground, infiltrated it thoroughly, and become deeply alarmed at its growing expertise.

Here they had found a target that was not only loathsome on its face, but clearly ripe for counterattack.

Those bitter rivals: AT&T, MCI and Sprint--and a crowd of Baby Bells: PacBell, Bell South, Southwestern Bell, NYNEX, USWest, as well as the Bell research consortium Bellcore, and the independent long-distance carrier Mid-American-- all were to have their role in the great hacker dragnet of 1990.

After years of being battered and pushed around, the telcos had, at least in a small way, seized the initiative again.

After years of turmoil, telcos and government officials were once again to work smoothly in concert in defense of the System.

Optimism blossomed; enthusiasm grew on all sides; the prospective taste of vengeance was sweet.

From the beginning--even before the crackdown had a name-- secrecy was a big problem. There were many good reasons for secrecy in the hacker crackdown. Hackers and code-thieves were wily prey, slinking back to their bedrooms and bas.e.m.e.nts and destroying vital incriminating evidence at the first hint of trouble.

Furthermore, the crimes themselves were heavily technical and difficult to describe, even to police--much less to the general public.

When such crimes HAD been described intelligibly to the public, in the past, that very publicity had tended to INCREASE the crimes enormously. Telco officials, while painfully aware of the vulnerabilities of their systems, were anxious not to publicize those weaknesses.

Experience showed them that those weaknesses, once discovered, would be pitilessly exploited by tens of thousands of people--not only by professional grifters and by underground hackers and phone phreaks, but by many otherwise more-or-less honest everyday folks, who regarded stealing service from the faceless, soulless "Phone Company" as a kind of harmless indoor sport. When it came to protecting their interests, telcos had long since given up on general public sympathy for "the Voice with a Smile." Nowadays the telco's "Voice" was very likely to be a computer's; and the American public showed much less of the proper respect and grat.i.tude due the fine public service bequeathed them by Dr. Bell and Mr. Vail.

The more efficient, high-tech, computerized, and impersonal the telcos became, it seemed, the more they were met by sullen public resentment and amoral greed.

Telco officials wanted to punish the phone-phreak underground, in as public and exemplary a manner as possible. They wanted to make dire examples of the worst offenders, to seize the ringleaders and intimidate the small fry, to discourage and frighten the wacky hobbyists, and send the professional grifters to jail. To do all this, publicity was vital.

Yet operational secrecy was even more so. If word got out that a nationwide crackdown was coming, the hackers might simply vanish; destroy the evidence, hide their computers, go to earth, and wait for the campaign to blow over. Even the young hackers were crafty and suspicious, and as for the professional grifters, they tended to split for the nearest state-line at the first sign of trouble.

For the crackdown to work well, they would all have to be caught red-handed, swept upon suddenly, out of the blue, from every corner of the compa.s.s.

And there was another strong motive for secrecy. In the worst-case scenario, a blown campaign might leave the telcos open to a devastating hacker counter-attack. If there were indeed hackers loose in America who had caused the January 15 Crash--if there were truly gifted hackers, loose in the nation's long-distance switching systems, and enraged or frightened by the crackdown--then they might react unpredictably to an attempt to collar them. Even if caught, they might have talented and vengeful friends still running around loose. Conceivably, it could turn ugly. Very ugly. In fact, it was hard to imagine just how ugly things might turn, given that possibility.

Counter-attack from hackers was a genuine concern for the telcos.

In point of fact, they would never suffer any such counter-attack.

But in months to come, they would be at some pains to publicize this notion and to utter grim warnings about it.

Still, that risk seemed well worth running. Better to run the risk of vengeful attacks, than to live at the mercy of potential crashers.

Any cop would tell you that a protection racket had no real future.

And publicity was such a useful thing. Corporate security officers, including telco security, generally work under conditions of great discretion.

And corporate security officials do not make money for their companies.

Their job is to PREVENT THE LOSS of money, which is much less glamorous than actually winning profits.

If you are a corporate security official, and you do your job brilliantly, then nothing bad happens to your company at all. Because of this, you appear completely superfluous. This is one of the many unattractive aspects of security work. It's rare that these folks have the chance to draw some healthy attention to their own efforts.

Publicity also served the interest of their friends in law enforcement.

Public officials, including law enforcement officials, thrive by attracting favorable public interest. A brilliant prosecution in a matter of vital public interest can make the career of a prosecuting attorney.

And for a police officer, good publicity opens the purses of the legislature; it may bring a citation, or a promotion, or at least a rise in status and the respect of one's peers.

But to have both publicity and secrecy is to have one's cake and eat it too.

In months to come, as we will show, this impossible act was to cause great pain to the agents of the crackdown. But early on, it seemed possible --maybe even likely--that the crackdown could successfully combine the best of both worlds. The ARREST of hackers would be heavily publicized.

The actual DEEDS of the hackers, which were technically hard to explain and also a security risk, would be left decently obscured. The THREAT hackers posed would be heavily trumpeted; the likelihood of their actually committing such fearsome crimes would be left to the public's imagination.

The spread of the computer underground, and its growing technical sophistication, would be heavily promoted; the actual hackers themselves, mostly bespectacled middle-cla.s.s white suburban teenagers, would be denied any personal publicity.

It does not seem to have occurred to any telco official that the hackers accused would demand a day in court; that journalists would smile upon the hackers as "good copy;" that wealthy high-tech entrepreneurs would offer moral and financial support to crackdown victims; that const.i.tutional lawyers would show up with briefcases, frowning mightily. This possibility does not seem to have ever entered the game-plan.

And even if it had, it probably would not have slowed the ferocious pursuit of a stolen phone-company doc.u.ment, mellifluously known as "Control Office Administration of Enhanced 911 Services for Special Services and Major Account Centers."

In the chapters to follow, we will explore the worlds of police and the computer underground, and the large shadowy area where they overlap. But first, we must explore the battleground. Before we leave the world of the telcos, we must understand what a switching system actually is and how your telephone actually works.

To the average citizen, the idea of the telephone is represented by, well, a TELEPHONE: a device that you talk into. To a telco professional, however, the telephone itself is known, in lordly fas.h.i.+on, as a "subset." The "subset" in your house is a mere adjunct, a distant nerve ending, of the central switching stations, which are ranked in levels of heirarchy, up to the long-distance electronic switching stations, which are some of the largest computers on earth.

Let us imagine that it is, say, 1925, before the introduction of computers, when the phone system was simpler and somewhat easier to grasp. Let's further imagine that you are Miss Leticia Luthor, a fictional operator for Ma Bell in New York City of the 20s.

Basically, you, Miss Luthor, ARE the "switching system."

You are sitting in front of a large vertical switchboard, known as a "cordboard," made of s.h.i.+ny wooden panels, with ten thousand metal-rimmed holes punched in them, known as jacks. The engineers would have put more holes into your switchboard, but ten thousand is as many as you can reach without actually having to get up out of your chair.

Each of these ten thousand holes has its own little electric lightbulb, known as a "lamp," and its own neatly printed number code.

With the ease of long habit, you are scanning your board for lit-up bulbs.

This is what you do most of the time, so you are used to it.

A lamp lights up. This means that the phone at the end of that line has been taken off the hook.

Whenever a handset is taken off the hook, that closes a circuit inside the phone which then signals the local office, i.e. you, automatically. There might be somebody calling, or then again the phone might be simply off the hook, but this does not matter to you yet. The first thing you do, is record that number in your logbook, in your fine American public-school handwriting. This comes first, naturally, since it is done for billing purposes.

You now take the plug of your answering cord, which goes directly to your headset, and plug it into the lit-up hole.

"Operator," you announce.

In operator's cla.s.ses, before taking this job, you have been issued a large pamphlet full of canned operator's responses for all kinds of contingencies, which you had to memorize. You have also been trained in a proper non-regional, non-ethnic p.r.o.nunciation and tone of voice.

You rarely have the occasion to make any spontaneous remark to a customer, and in fact this is frowned upon (except out on the rural lines where people have time on their hands and get up to all kinds of mischief).

A tough-sounding user's voice at the end of the line gives you a number. Immediately, you write that number down in your logbook, next to the caller's number, which you just wrote earlier. You then look and see if the number this guy wants is in fact on your switchboard, which it generally is, since it's generally a local call.

Long distance costs so much that people use it sparingly.

Only then do you pick up a calling-cord from a shelf at the base of the switchboard. This is a long elastic cord mounted on a kind of reel so that it will zip back in when you unplug it. There are a lot of cords down there, and when a bunch of them are out at once they look like a nest of snakes. Some of the girls think there are bugs living in those cable-holes. They're called "cable mites"

and are supposed to bite your hands and give you rashes.

You don't believe this, yourself.

Gripping the head of your calling-cord, you slip the tip of it deftly into the sleeve of the jack for the called person.

Not all the way in, though. You just touch it. If you hear a clicking sound, that means the line is busy and you can't put the call through. If the line is busy, you have to stick the calling-cord into a "busy-tone jack," which will give the guy a busy-tone. This way you don't have to talk to him yourself and absorb his natural human frustration.

But the line isn't busy. So you pop the cord all the way in.

Relay circuits in your board make the distant phone ring, and if somebody picks it up off the hook, then a phone conversation starts. You can hear this conversation on your answering cord, until you unplug it. In fact you could listen to the whole conversation if you wanted, but this is sternly frowned upon by management, and frankly, when you've overheard one, you've pretty much heard 'em all.

You can tell how long the conversation lasts by the glow of the calling-cord's lamp, down on the calling-cord's shelf.

When it's over, you unplug and the calling-cord zips back into place.

Click Like and comment to support us!

RECENTLY UPDATED NOVELS

About The Hacker Crackdown Part 6 novel

You're reading The Hacker Crackdown by Author(s): Bruce Sterling. This novel has been translated and updated at LightNovelsOnl.com and has already 637 views. And it would be great if you choose to read and follow your favorite novel on our website. We promise you that we'll bring you the latest novels, a novel list updates everyday and free. LightNovelsOnl.com is a very smart website for reading novels online, friendly on mobile. If you have any questions, please do not hesitate to contact us at [email protected] or just simply leave your comment so we'll know how to make you happy.